Sciweavers

5639 search results - page 728 / 1128
» Timed Abstract Non-interference
Sort
View
ASIACRYPT
2010
Springer
15 years 3 months ago
Improved Single-Key Attacks on 8-Round AES-192 and AES-256
Abstract. AES is the most widely used block cipher today, and its security is one of the most important issues in cryptanalysis. After 13 years of analysis, related-key attacks wer...
Orr Dunkelman, Nathan Keller, Adi Shamir
FOCS
2010
IEEE
15 years 3 months ago
A Multiplicative Weights Mechanism for Privacy-Preserving Data Analysis
Abstract--We consider statistical data analysis in the interactive setting. In this setting a trusted curator maintains a database of sensitive information about individual partici...
Moritz Hardt, Guy N. Rothblum
HPCC
2011
Springer
14 years 4 months ago
Achieving Performance and Availability Guarantees with Spot Instances
Abstract—In the Infrastructure-as-a-Service (IaaS) cloud computing market, spot instances refer to virtual servers that are rented via an auction. Spot instances allow IaaS provi...
Michele Mazzucco, Marlon Dumas

Publication
767views
17 years 3 months ago
Analysis of the Increase/Decrease Algorithms for Congestion Avoidance in Computer Networks
Congestion avoidance mechanisms allow a network to operate in the optimal region of low delay and high throughput, thereby, preventing the network from becoming congested. This is ...
D. Chiu and R. Jain
CVPR
2008
IEEE
16 years 7 months ago
Selective hidden random fields: Exploiting domain-specific saliency for event classification
Classifying an event captured in an image is useful for understanding the contents of the image. The captured event provides context to refine models for the presence and appearan...
Vidit Jain, Amit Singhal, Jiebo Luo